ns_name 101 security/apparmor/domain.c const char *ns_name; ns_name 109 security/apparmor/domain.c ns_name = aa_ns_name(profile->ns, tp->ns, true); ns_name 111 security/apparmor/domain.c state = aa_dfa_match(profile->file.dfa, state, ns_name); ns_name 50 security/apparmor/include/lib.h char *aa_split_fqname(char *args, char **ns_name); ns_name 51 security/apparmor/include/lib.h const char *aa_splitn_fqname(const char *fqname, size_t n, const char **ns_name, ns_name 24 security/apparmor/include/policy_unpack.h const char *ns_name; ns_name 1245 security/apparmor/label.c const char *ns_name; ns_name 1251 security/apparmor/label.c ns_name = aa_ns_name(profile->ns, tp->ns, true); ns_name 1253 security/apparmor/label.c state = aa_dfa_match(profile->policy.dfa, state, ns_name); ns_name 1488 security/apparmor/label.c const char *ns_name = NULL; ns_name 1500 security/apparmor/label.c ns_name = aa_ns_name(view, profile->ns, ns_name 1502 security/apparmor/label.c if (ns_name == aa_hidden_ns_name) { ns_name 1505 security/apparmor/label.c return snprintf(str, size, "%s", ns_name); ns_name 1512 security/apparmor/label.c if (ns_name) ns_name 1513 security/apparmor/label.c return snprintf(str, size, ":%s:%s (%s)", ns_name, ns_name 1519 security/apparmor/label.c if (ns_name) ns_name 1520 security/apparmor/label.c return snprintf(str, size, ":%s:%s", ns_name, ns_name 42 security/apparmor/lib.c char *aa_split_fqname(char *fqname, char **ns_name) ns_name 46 security/apparmor/lib.c *ns_name = NULL; ns_name 49 security/apparmor/lib.c *ns_name = skip_spaces(&name[1]); ns_name 83 security/apparmor/lib.c const char *aa_splitn_fqname(const char *fqname, size_t n, const char **ns_name, ns_name 89 security/apparmor/lib.c *ns_name = NULL; ns_name 97 security/apparmor/lib.c *ns_name = skipn_spaces(&name[1], end - &name[1]); ns_name 98 security/apparmor/lib.c if (!*ns_name) ns_name 101 security/apparmor/lib.c *ns_len = split - *ns_name; ns_name 103 security/apparmor/lib.c *ns_name = NULL; ns_name 111 security/apparmor/lib.c *ns_len = end - *ns_name; ns_name 461 security/apparmor/policy.c const char *name, *ns_name; ns_name 464 security/apparmor/policy.c name = aa_splitn_fqname(fqname, n, &ns_name, &ns_len); ns_name 465 security/apparmor/policy.c if (ns_name) { ns_name 466 security/apparmor/policy.c ns = aa_lookupn_ns(labels_ns(base), ns_name, ns_len); ns_name 618 security/apparmor/policy.c const char *ns_name, const char *name, ns_name 623 security/apparmor/policy.c aad(&sa)->iface.ns = ns_name; ns_name 859 security/apparmor/policy.c const char *ns_name, *info = NULL; ns_name 870 security/apparmor/policy.c error = aa_unpack(udata, &lh, &ns_name); ns_name 881 security/apparmor/policy.c if (ns_name) { ns_name 882 security/apparmor/policy.c if (ent->ns_name && ns_name 883 security/apparmor/policy.c strcmp(ent->ns_name, ns_name) != 0) { ns_name 888 security/apparmor/policy.c } else if (ent->ns_name) { ns_name 894 security/apparmor/policy.c ns_name = ent->ns_name; ns_name 898 security/apparmor/policy.c if (ns_name) { ns_name 900 security/apparmor/policy.c ns_name); ns_name 1006 security/apparmor/policy.c audit_policy(label, op, ns_name, ent->new->base.hname, ns_name 1019 security/apparmor/policy.c audit_policy(label, op, ns_name, ent->new->base.hname, NULL, ns_name 1057 security/apparmor/policy.c audit_policy(label, op, ns_name, ent ? ent->new->base.hname : NULL, ns_name 1068 security/apparmor/policy.c audit_policy(label, op, ns_name, tmp->new->base.hname, info, ns_name 1099 security/apparmor/policy.c const char *ns_name = NULL; ns_name 1111 security/apparmor/policy.c name = aa_splitn_fqname(fqname, size, &ns_name, &ns_len); ns_name 1114 security/apparmor/policy.c ns_name, ns_len); ns_name 1147 security/apparmor/policy.c (void) audit_policy(subj, OP_PROF_RM, ns_name, name, info, ns_name 1158 security/apparmor/policy.c (void) audit_policy(subj, OP_PROF_RM, ns_name, name, info, ns_name 104 security/apparmor/policy_unpack.c static int audit_iface(struct aa_profile *new, const char *ns_name, ns_name 112 security/apparmor/policy_unpack.c aad(&sa)->iface.ns = ns_name; ns_name 671 security/apparmor/policy_unpack.c static struct aa_profile *unpack_profile(struct aa_ext *e, char **ns_name) ns_name 684 security/apparmor/policy_unpack.c *ns_name = NULL; ns_name 696 security/apparmor/policy_unpack.c *ns_name = kstrndup(tmpns, ns_len, GFP_KERNEL); ns_name 697 security/apparmor/policy_unpack.c if (!*ns_name) { ns_name 1029 security/apparmor/policy_unpack.c kfree(ent->ns_name); ns_name 1068 security/apparmor/policy_unpack.c char *ns_name = NULL; ns_name 1075 security/apparmor/policy_unpack.c profile = unpack_profile(&e, &ns_name); ns_name 1098 security/apparmor/policy_unpack.c ent->ns_name = ns_name;